IT Management  >   Systems Operations  >   Security  >  

Zero Day Threats

RSS Feed    Add to Google    Add to My Yahoo!
Zero Day Threats White Papers (View All Report Types)
 
Is Your IT Security Affecting Your Workforce Productivity?
sponsored by Dell and Microsoft
WHITE PAPER: Read this infographic to learn more about the trends, drivers, and challenges organizations face in regards to their workforce security.
Posted: 20 Jun 2017 | Published: 20 Jun 2017

Dell and Microsoft

The Essential Checklist: A Practical Guide to Efficient Security Response
sponsored by ServiceNow
WHITE PAPER: Find out how to detect and resolve data breaches faster by using a security operations checklist to identify which areas of your strategy could benefit most from updated methodologies like security automation.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

ServiceNow

Cisco Umbrella Shoots for Secure Internet, Anywhere
sponsored by Cisco Umbrella
WHITE PAPER: Discover how to mitigate risks and improve your security posture for the cloud by leveraging SaaS-based tools that enable advanced malware protection for your network, real-time threat intelligence, and increased DNS gateway security.
Posted: 09 Aug 2017 | Published: 09 Aug 2017

Cisco Umbrella

Security Investigations: The Importance of Detection and Rapid Response
sponsored by Splunk
WHITE PAPER: Gain a holistic view of what defines a security investigation, as well as a security program that provides an analytics-driven approach to security. Discover how through analytics you'll be able to detect threats, visualize security data, and more.
Posted: 11 Sep 2017 | Published: 11 Sep 2017

Splunk

VoIP Adoption Leads to Free PCI Upgrades for Major Quick Service Restaurant
sponsored by Hughes Network Systems
WHITE PAPER: The case study uncovers how VoIP adoption and network service consolidation helped a popular restaurant chain address growing cybersecurity challenges and increase their bandwidth for the best network connection.
Posted: 01 Sep 2017 | Published: 30 Apr 2017

Hughes Network Systems

Securing Industrial IoT Technology: 4 Key Considerations
sponsored by Bayshore Networks
WHITE PAPER: Learn how to stop cyberthreats before they can damage critical industrial assets and systems by going inside one cyberattack launched against energy organization Consolidated Power. See how they used an industrial cyber protection platform and uncover 4 considerations for IIoT security.
Posted: 02 Aug 2017 | Published: 02 Aug 2017

Bayshore Networks

Research Report: IoT DDoS Attacks Show the Stakes Have Changed
sponsored by Arbor Networks
WHITE PAPER: How can IT network pros defend against DDoS attacks on IoT devices? In this white paper, uncover the recommendations on how to design your DNS infrastructure for stronger security against botnets. Then find out how Forrester Research believes the business technology ecosystem is changing.
Posted: 19 Oct 2017 | Published: 19 Oct 2017

Arbor Networks

4 Key Considerations for Securing Operation Technology in the Oil & Gas Industry
sponsored by Bayshore Networks
WHITE PAPER: The Industrial Internet of Things (IIoT) is revolutionizing the manufacturing industry – but also opens the door to cyber threats. Learn about the opportunities and risks created, and the need for securing the operation technology environment. Plus, discover 4 key considerations to protect industrial assets against cyber threats.
Posted: 27 Jul 2017 | Published: 02 Jul 2017

Bayshore Networks

Fabric vs. Platform Approach to Enterprise Security
sponsored by Fortinet, Inc.
WHITE PAPER: Learn the differences, strengths, uses, and pros and cons of a security platform vs. a security fabric approach to protecting your organization.
Posted: 02 Jun 2017 | Published: 02 Jun 2017

Fortinet, Inc.

It Vs. Users? How Law Firms Can Maximize Security While Granting Access To The Web
sponsored by Authentic8, Inc.
WHITE PAPER: Discover how to maximize network and endpoint security while still granting the web access employees need to stay productive, with a particular focus on the role of security in law firms. Learn how to go beyond virtualization to secure web access and use Silo to create secure, cloud-based virtual browsers.
Posted: 28 Jul 2017 | Published: 31 Dec 2016

Authentic8, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement